Search Results - (((((((ant OR wyatt) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 56
- Data processing 54
- Mathematics 43
- Mathematical models 37
- artificial intelligence 30
- Machine learning 28
- Mathematical optimization 26
- Algorithms 25
- Data mining 24
- Technological innovations 22
- Artificial Intelligence 21
- algorithms 21
- Social aspects 19
- Computer networks 17
- History 15
- Information technology 15
- Computer science 14
- Big data 13
- Computer algorithms 13
- Python (Computer program language) 13
- Data Mining 12
- Digital techniques 12
- Image processing 12
- Research 12
- Statistical methods 12
- methods 12
- Design and construction 11
- Engineering 11
- Management 11
- Decision making 10
Search alternatives:
-
481
-
482
Machine learning for protein subcellular localization prediction
Published 2015Table of Contents: “…5.2.2 Problem transformation methods -- 5.2.3 Multi-label classification in bioinformatics -- 5.3 mGOASVM: A predictor for both single- and multi-location proteins -- 5.3.1 Feature extraction -- 5.3.2 Multi-label multiclass SVM classification -- 5.4 AD-SVM: An adaptive decision multi-label predictor -- 5.4.1 Multi-label SVM scoring -- 5.4.2 Adaptive decision for SVM (AD-SVM) -- 5.4.3 Analysis of AD-SVM -- 5.5 mPLR-Loc: A multi-label predictor based on penalized logistic regression -- 5.5.1 Single-label penalized logistic regression -- 5.5.2 Multi-label penalized logistic regression -- 5.5.3 Adaptive decision for LR (mPLR-Loc) -- 5.6 Summary -- 6 Mining deeper on GO for protein subcellular localization -- 6.1 Related work -- 6.2 SS-Loc: Using semantic similarity over GO -- 6.2.1 Semantic similarity measures -- 6.2.2 SS vector construction -- 6.3 HybridGO-Loc: Hybridizing GO frequency and semantic similarity features -- 6.3.1 Hybridization of two GO features -- 6.3.2 Multi-label multiclass SVM classification -- 6.4 Summary -- 7 Ensemble random projection for large-scale predictions -- 7.1 Random projection -- 7.2 RP-SVM: A multi-label classifier with ensemble random projection -- 7.2.1 Ensemble multi-label classifier -- 7.2.2 Multi-label classification -- 7.3 R3P-Loc: A compact predictor based on ridge regression and ensemble random projection -- 7.3.1 Limitation of using current databases -- 7.3.2 Creating compact databases -- 7.3.3 Single-label ridge regression -- 7.3.4 Multi-label ridge regression -- 7.4 Summary -- 8 Experimental setup -- 8.1 Prediction of single-label proteins -- 8.1.1 Datasets construction -- 8.1.2 Performance metrics -- 8.2 Prediction of multi-label proteins -- 8.2.1 Dataset construction -- 8.2.2 Datasets analysis -- 8.2.3 Performance metrics -- 8.3 Statistical evaluation methods -- 8.4 Summary.…”
Full text (MFA users only)
Electronic eBook -
483
Eat, cook, grow : mixing human-computer interactions with human-food interactions
Published 2014Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
Full text (MFA users only)
Electronic eBook -
484
Medical and Care Compunetics 2 : Medical and Care Compunetics 2.
Published 2005Table of Contents: “…Standardized Semantic Markup for Reference Terminologies, Thesauri and Coding Systems: Benefits for Distributed E-Health ApplicationsDevelopment of an Expert System for Classification of Medical Errors; Model of Good Practice Tools for Risk Reduction and Clinical Governance; Optimisation Issues of High Throughput Medical Data and Video Streaming Traffic in 3G Wireless Environments; A New Algorithm for Content-Based Region Query in Databases with Medical Images; Economic Impact of Telemedicine: A Survey.…”
Full text (MFA users only)
Electronic eBook -
485
FRBR, before and after : a look at our bibliographic models
Published 2016Full text (MFA users only)
Electronic eBook -
486
Automatic indexing and abstracting of document texts
Published 2000Full text (MFA users only)
Electronic eBook -
487
The Johns Hopkins guide to digital media
Published 2014Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
Book -
488
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
489
Fast finance : does the financial world allow social loafing?
Published 2014Full text (MFA users only)
Electronic eBook -
490
-
491
Mechanical and electrical technology VI : selected, peer reviewed papers from the 2014 6 th International Conference on Mechanical and Electrical Technology (ICMET 2014), July 17-1...
Published 2014Table of Contents: “…Mechanical and Electrical Technology VI; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Thermal and Mechanical Research, General Mechanical Engineering; Prediction the Springback in Air-Bending Process Using Neural Network Metamodel; Dynamic Equilibrium Configurations of Multibody Systems; Wear Behaviour of Stellite 6 Coatings Produced on an Austenitic Stainless Steel Substrate by Laser Cladding Using Two Different Heat Inputs; Influence of Pipe Diameters on Shapes of Air Taylor Bubbles in Small Pipes Containing Stagnant Water…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
492
Fundamentals of patenting and licensing for scientists and engineers
Published 2009Table of Contents: “…When final rejection is received. 8.9. Appeal. 8.10. …”
Full text (MFA users only)
Electronic eBook -
493
Understanding large temporal networks and spatial networks : exploration, pattern searching, visualization and network evolution
Published 2014Table of Contents: “…Spanish Algorithms -- 3.8.4.A Sparse Network Algorithm -- 3.9. …”
Full text (MFA users only)
Electronic eBook -
494
Advanced design and manufacturing technology I
Published 2011Table of Contents: “…Preface -- Technology and Characteristic of Wool Ring Spun Compound Yarn -- A Co-Evolutionary Contract Net-Based Framework for Distributed Manufacturing Execution Systems -- The Research on Cutting Force in High-Speed Milling Process of Aluminum Alloy Impeller -- Research of Asynchronous Multi-Type Sensors Data Fusion -- Researcher of Region Growing Medical Image Segmentation Based on Adaboost Algorithm -- Trail Investigation on Chip of High-Speed and Dry Cutting on Hardened Steel with PCBN Tool -- Simulate Measure for Spring Back of Autobody Panel's Edge -- Reconfigurable Clamping Device Based on Memory Alloy, Orientation Disc, Majority Column and Telescopic Pole -- Analysis of Mechanical Characteristics and Structural Options of Micro-Milling Cutter -- Study on Predictive Control of Ship Steering Gear System -- Research of Hydroforming Technology for Special-Shaped Cross-Section Pipe -- Design of CNC Grinding Machine Especially for C.V Joint Inner Race Spherical Raceway Processing -- Passivation of the Fe-Based Bulk Amorphous Alloy in HCl Solution -- Simulation of Temperature Field during 7022 Al Alloy Friction Stir Welding process Based on Dual-Source -- Study on Al-4.5Cu-3Ce Alloy Semi-Solid Slurry Prepared by Slope Vibration Casting -- Precision Control Research on DACS-Based Modern Digital Shipbuilding Technology -- Contact Stress Analysis of NCD Coating on Roll Ball of Ball Bearing -- Low Cycling Thermal Fatigue of Large-Scale Marine Diesel Engine Piston -- Study on Remote Monitoring and Control System for Construction Vehicle -- Research on New Structural Quay Container Crane -- Study on the Microstructure and Properties of Suspensory Wire in DVD CD-ROM Head -- Investigation of the Precipitation in Mg-Zr Alloys -- The Optimization of Cutting Parameter of Machining the Small Diameter Deep Hole on Austenitic Stainless Steel -- An Analysis of Drawing Process in Stamping Die Design for the Wheel Hub -- Effects of Residual Stress on Interfacial Bonding Strength of Zinc-Plated Film -- Friction and Wear of Polished Single Crystal Silicon at Different Area -- Numerical Simulation of the Machining Distortion of Aircraft Aluminum Part Caused by Redistribution of Residual Stress -- Study on Fuzzy D-S Evidence Theory Mathematics Foundation Based on the Form Prototype -- Study on the Influence of Internal Flow Field in Pipeline Elbow by the Guide Plate -- Research on Electrical Resistively of Wood Dust -- Primary Research of Bionic Design on Tools with Mouthpart of Larvae Long Horned Beetles -- Adsorption Analysis of Cr(VI) by Fly Ash Composite Material in Aqueous Medium -- Research of Controlling Heat Treatment Deformation for Powder Metallurgy Mechanical Structural Parts -- Influence of Vacuum Heat Treatment on Sintered W-Cu Alloy Performances -- Design on Numerical Control System of Glass Cutting Machine Based on PC -- Fast Frequency Hopping Signal Generator Based on DDS -- The Optimization of Material Thickness for Neutron Shielding with Monte Carlo Method -- A Method to Measure Rotary Speed and Torque Using JC Sensors -- Different Evaluation Approaches of Confusion Network in Chinese Spoken Classification -- Study on Mine-Used Battery Locomotive Charging System -- Steel Wire Rope Section Damage Detection System Based on Wavelet Multi-Resolution Analysis -- Three-Level SVPWM Controller Design Based on FPGA -- Phase Error Immunity Optical Measurement System -- A Stable Least Squares Ellipses Fitting Algorithm Based on Zernike Moments -- Accuracy Verification Method about Optical Three-Dimensional Measuring Instrument -- Contrast Research on Cutting Forces in 4-Axis and 5-Axis Blade Machining Process -- A Method to Center Extraction of Reference Point Algorithm in Reverse Engineering -- Optimal Design of Flexible Manufacturing System Based on Optical Measurement Principle -- Material Removal for Modal Effect on Impeller Blades by Finite Element Analysis -- Rotation Inertia Measurement Device Design of Winged Rigid Body Based on TRIZ Conflict Resolving Matrix -- Development of NC System of the 3-PUU Parallel Machine Tool Based on PMAC -- Finite Element Analysis and Dynamic Testing for Hard Gear Cutting by Gear Hobbing Machine -- Design and Stimulation of Hydraulic Servo System for Vehicle Test Equipment for Rubber Shock Absorber -- Research on Chip Breaking Mechanism of High-Temperature and High-Strength Steel 2.25Cr-1Mo-0.25V -- Research on the Machinability of Hydrogenated Cylindrical Shell Materials (2.25 Cr-1Mo-0.25V Steel) -- Applied Research of the Electric Spindle Technology on Sub-Nanometer Crusher with Cellulosine -- High-Speed Milling Toolpath Planning for Aviation Engines Impeller Using POWERMILL Software -- Finite Element Analysis of Cold Extrusion Combination Mold Interference Fit -- Coagulant Prepared by Gangue and its Application in Treatment of Coal Washing Wastewater -- Development and Oxidation of RexOy-Modified Aluminide Coating -- Design and Research on Two-Degree of Freedom Spherical Gear -- An Algorithm for Computation of Radial-Harmonic-Fourier Moments -- Applied Research on Synesthesia Theory in Industrial Design.…”
Full text (MFA users only)
Electronic eBook -
495
Advances in portfolio construction and implementation
Published 2003Full text (MFA users only)
Electronic eBook -
496
A Primer on Machine Learning Applications in Civil Engineering
Published 2019Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- A Primer on Machine Learning Applications in Civil Engineering -- Author -- 1: Introduction -- 1.1 Machine Learning -- 1.2 Learning from Data -- 1.3 Research in Machine Learning: Recent Progress -- 1.4 Artificial Neural Networks -- 1.5 Fuzzy Logic (FL) -- 1.6 Genetic Algorithms -- 1.7 Support Vector Machine (SVM) -- 1.8 Hybrid Approach (HA) -- Bibliography -- 2: Artificial Neural Networks -- 2.1 Introduction to Fundamental Concepts and Terminologies -- 2.2 Evolution of Neural Networks -- 2.3 Models of ANN -- 2.4 McCulloch-Pitts Model -- 2.5 Hebb Network -- 2.6 Summary -- 2.7 Supervised Learning Network -- 2.7.1 Perceptron Network -- 2.7.2 Adaptive Linear Neuron -- 2.7.3 Back-Propagation Network -- 2.7.4 Radial Basis Function Network -- 2.7.5 Generalized Regression Neural Networks -- 2.7.6 Summary -- 2.8 Unsupervised Learning Networks -- 2.8.1 Introduction -- 2.8.2 Kohonen Self-Organizing Feature Maps -- 2.8.3 Counter Propagation Network -- 2.8.4 Adaptive Resonance Theory Network -- 2.8.5 Summary -- 2.9 Special Networks -- 2.9.1 Introduction -- 2.9.2 Gaussian Machine -- 2.9.3 Cauchy Machine -- 2.9.4 Probabilistic Neural Network -- 2.9.5 Cascade Correlation Neural Network -- 2.9.6 Cognitive Network -- 2.9.7 Cellular Neural Network -- 2.9.8 Optical Neural Network -- 2.9.9 Summary -- 2.10 Working Principle of ANN -- 2.10.1 Introduction -- 2.10.2 Types of Activation Function -- 2.10.3 ANN Architecture -- 2.10.4 Learning Process -- 2.10.5 Feed-Forward Back Propagation -- 2.10.6 Strengths of ANN -- 2.10.7 Weaknesses of ANN -- 2.10.8 Working of the Network -- 2.10.9 Summary -- Bibliography -- 3: Fuzzy Logic -- 3.1 Introduction to Classical Sets and Fuzzy Sets -- 3.1.1 Classical Sets -- 3.1.2 Fuzzy Sets -- 3.1.3 Summary.…”
Full text (MFA users only)
Electronic eBook -
497
Practical Strategies in Geriatric Mental Health : Cases and Approaches.
Published 2019Full text (MFA users only)
Electronic eBook -
498
Data mining for the social sciences : an introduction
Published 2015Full text (MFA users only)
Electronic eBook -
499
Handbook for pandemic and mass-casualty planning and response
Published 2012Full text (MFA users only)
Electronic Conference Proceeding eBook -
500
Debates in the digital humanities 2016
Published 2016Table of Contents: “…Father Busa Female Punch Card Operatives / Melissa Terras and Julianne Nyhan -- On the Origin of "Hack" and "Yack" / Bethany Nowviskie -- Reflections on a Movement: #transformDH, Growing Up / Moya Bailey, Anne Cong-Huyen, Alexis Lothian, and Amanda Phillips.…”
Full text (MFA users only)
Electronic eBook